Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Svchost.exe*32 Is this a virus?


  • Please log in to reply
10 replies to this topic

#1 Surgeo

Surgeo

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:54 AM

Posted 09 February 2013 - 08:43 AM

I really need some help and knowledge about my situation.
I have this  process Svchost.exe*32 with the description "winrscmde" that shows up on my task manager.

This process is using up between 500,000 to 1,100,000 memory all the time, and about 50 cpu.  it really drags my computer down and I have no clue what it is (I have looked up svchost, but not *32)  so if someone could pleas help me figure this out I would really appreciate your help.

 

Is this a serious situation? I have had blue screen happen to me several times but my comp seems to be fine. 

I mostly have no clue what I am doing with computers. 


Edited by Surgeo, 09 February 2013 - 08:45 AM.


BC AdBot (Login to Remove)

 


#2 narenxp

narenxp

  • BC Advisor
  • 16,371 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:India
  • Local time:05:54 AM

Posted 09 February 2013 - 08:46 AM

  • Please download TDSSKiller from here and save it to your Desktop
  • Doubleclick on TDSSKiller.exe to run the application, then click on Change parameters




  • Check Loaded Modules  and Detect TDLFS file systemDo not check Verify file digital signatures (even though it is checked in the example)
  • If you are asked to reboot because an "Extended Monitoring Driver is required" please click Reboot now




  • Click Start Scan and allow the scan process to run

  • If threats are detected select Skip for all of them unless I instruct you otherwise
  • Click Continue




  • Click Reboot computer
  • Please post the contents of  TDSSKiller.[Version]_[Date]_[Time]_log.txt found in your root directory (typically c:\)in your reply


===================================================


aswMBR

--------------------

  • Download aswMBR and save it to your desktop.
  • Please disable your real time protection of any Antivirus, Antispyware or Antimalware programs temporarily. They will interfere and may cause unexpected results.
  • If you need help to disable your protection programs see here and here.
  • Double click the aswMBR.exe file to run it. Please allow when you are asked to download AVAST antivirus engine defs.
  • Wait until the AV update is done, then click on the Scan button to start. The program will launch a scan.



  • When done, you will see Scan finished successfully. Please click on Save log and save the file to your desktop.



  • Please post the contents of the log in your next reply.

NOTE:  aswMBR will create MBR.dat file on your desktop. This is a copy of your MBR. Do NOT delete it.


===================================================


ESET Online Scanner

--------------------

I'd like us to scan your machine with ESET OnlineScan  This process may may take several hours, that is normal

  • Hold down Control and click on this link to open ESET OnlineScan in a new window.
  • Click the   button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)

    • Click on esetsmartinstaller_enu.exe to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the icon on your desktop.

  • Check "YES, I accept the Terms of Use."
  • Click the Start button.
  • Accept any security warnings from your browser.
  • Under scan settings, check "Scan Archives" and "Remove found threats"
  • Click Advanced settings and select the following:

    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click List Threats
  • Copy and paste the information in your next reply.   Note:  If no malware was found you will not get a log.
  • Click the Back button.
  • Click the Finish button.


===================================================


Things I would like to see in your next reply. Please be sure to copy and paste the information rather than send an attachment. :thumbsup2:

  • TDSSKiller log
  • aswMBR log
  • ESET results



#3 Surgeo

Surgeo
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:54 AM

Posted 09 February 2013 - 09:29 AM

Says my post are too long, any way around that?
 



#4 narenxp

narenxp

  • BC Advisor
  • 16,371 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:India
  • Local time:05:54 AM

Posted 09 February 2013 - 09:32 AM

Paste only the lowermost part of TDSSkiller log.I need only few lines from bottom.



#5 Surgeo

Surgeo
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:54 AM

Posted 09 February 2013 - 09:35 AM

08:59:33.0526 4220  C:\Windows\SysWOW64\schannel.dll - ok
08:59:33.0533 4220  [ 220159496484D34009DE71CA1A68E0D4 ] C:\Windows\System32\wbem\NCProv.dll
08:59:33.0533 4220  C:\Windows\System32\wbem\NCProv.dll - ok
08:59:33.0533 4220  ============================================================
08:59:33.0533 4220  Scan finished
08:59:33.0534 4220  ============================================================
08:59:33.0544 4212  Detected object count: 1
08:59:33.0544 4212  Actual detected object count: 1
08:59:46.0504 4212  \Device\Harddisk0\DR0 ( Rootkit.Boot.Pihar.c ) - skipped by user
08:59:46.0504 4212  \Device\Harddisk0\DR0 ( Rootkit.Boot.Pihar.c ) - User select action: Skip 
09:26:39.0751 3460  Deinitialize success


#6 Surgeo

Surgeo
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:54 AM

Posted 09 February 2013 - 09:38 AM

MBR version 0.9.9.1707 Copyright© 2011 AVAST Software
Run date: 2013-02-09 09:06:35
-----------------------------
09:06:35.682    OS Version: Windows x64 6.1.7600 
09:06:35.682    Number of processors: 2 586 0x602
09:06:35.682    ComputerName: DOROTHY-PC-PC  UserName: Sergio
09:06:37.868    Initialize success
09:08:06.375    AVAST engine defs: 13020900
09:08:53.960    Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\00000056
09:08:53.961    Disk 0 Vendor: ST350041 HP34 Size: 476940MB BusType: 3
09:08:53.962    Device \Driver\nvstor64 -> MajorFunction fffffa800388d5e8
09:08:53.964    Disk 0 MBR read successfully
09:08:53.965    Disk 0 MBR scan
09:08:53.969    Disk 0 unknown MBR code
09:08:53.985    Disk 0 Partition 1 80 (A) 07    HPFS/NTFS NTFS          100 MB offset 2048
09:08:53.995    Disk 0 Partition 2 00     07    HPFS/NTFS NTFS       466885 MB offset 206848
09:08:54.018    Disk 0 Partition 3 00     07    HPFS/NTFS NTFS         9953 MB offset 956387328
09:08:54.048    Disk 0 scanning C:\Windows\system32\drivers
09:09:02.300    Service scanning
09:09:18.600    Modules scanning
09:09:18.600    Disk 0 trace - called modules:
09:09:18.601    ntoskrnl.exe CLASSPNP.SYS disk.sys ACPI.sys >>UNKNOWN [0xfffffa800388d5e8]<<
09:09:18.602    1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0xfffffa80032de060]
09:09:18.603    3 CLASSPNP.SYS[fffff8800193c43f] -> nt!IofCallDriver -> [0xfffffa8002cc03b0]
09:09:18.603    5 ACPI.sys[fffff88000f36781] -> nt!IofCallDriver -> \Device\00000056[0xfffffa8002cd37e0]
09:09:18.603    \Driver\nvstor64[0xfffffa8003809060] -> IRP_MJ_CREATE -> 0xfffffa800388d5e8
09:09:22.199    AVAST engine scan C:\Windows
09:09:23.765    AVAST engine scan C:\Windows\system32
09:13:48.227    AVAST engine scan C:\Windows\system32\drivers
09:13:59.921    AVAST engine scan C:\Users\Sergio
09:15:50.690    Disk 0 MBR has been saved successfully to "C:\Users\Sergio\Desktop\MBR.dat"
09:15:51.004    The log file has been saved successfully to "C:\Users\Sergio\Desktop\aswMBR #1.txt"
09:19:40.030    AVAST engine scan C:\ProgramData
09:22:16.116    Scan finished successfully
09:22:26.354    Disk 0 MBR has been saved successfully to "C:\Users\Sergio\Desktop\MBR.dat"
09:22:26.357    The log file has been saved successfully to "C:\Users\Sergio\Desktop\aswMBR.txt"


#7 narenxp

narenxp

  • BC Advisor
  • 16,371 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:India
  • Local time:05:54 AM

Posted 09 February 2013 - 09:41 AM

Run TDSSkiller again and select CURE for this

 

08:59:46.0504 4212  \Device\Harddisk0\DR0 ( Rootkit.Boot.Pihar.c ) - User select action: Skip

 

 

Restart the PC,run TDSSkiller again and post the new log



#8 Surgeo

Surgeo
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:54 AM

Posted 09 February 2013 - 09:48 AM

09:47:23.0553 1480  ============================================================
09:47:23.0553 1480  Scan finished
09:47:23.0553 1480  ============================================================
09:47:23.0569 2604  Detected object count: 0
09:47:23.0585 2604  Actual detected object count: 0
09:47:49.0044 2968  Deinitialize success


#9 Surgeo

Surgeo
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:54 AM

Posted 09 February 2013 - 11:33 AM

Here is the aswmbr, I am still waiting for ESET OnlineScan to finish.

 aswMBR version 0.9.9.1707 Copyright© 2011 AVAST Software

Run date: 2013-02-09 11:12:29
-----------------------------
11:12:29.987    OS Version: Windows x64 6.1.7600 
11:12:29.987    Number of processors: 2 586 0x602
11:12:29.987    ComputerName: DOROTHY-PC-PC  UserName: Sergio
11:12:35.597    Initialize success
11:12:50.702    AVAST engine defs: 13020900
11:13:36.915    Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\00000056
11:13:36.916    Disk 0 Vendor: ST350041 HP34 Size: 476940MB BusType: 3
11:13:36.931    Disk 0 MBR read successfully
11:13:36.932    Disk 0 MBR scan
11:13:36.935    Disk 0 unknown MBR code
11:13:36.945    Disk 0 Partition 1 80 (A) 07    HPFS/NTFS NTFS          100 MB offset 2048
11:13:36.955    Disk 0 Partition 2 00     07    HPFS/NTFS NTFS       466885 MB offset 206848
11:13:36.979    Disk 0 Partition 3 00     07    HPFS/NTFS NTFS         9953 MB offset 956387328
11:13:37.008    Disk 0 scanning C:\Windows\system32\drivers
11:13:49.569    Service scanning
11:14:21.743    Modules scanning
11:14:21.749    Disk 0 trace - called modules:
11:14:21.779    ntoskrnl.exe CLASSPNP.SYS disk.sys ACPI.sys storport.sys hal.dll nvstor64.sys 
11:14:21.785    1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0xfffffa80032dd440]
11:14:21.789    3 CLASSPNP.SYS[fffff8800191b43f] -> nt!IofCallDriver -> [0xfffffa8002c8c3d0]
11:14:21.793    5 ACPI.sys[fffff88000eff781] -> nt!IofCallDriver -> \Device\00000056[0xfffffa80030927e0]
11:14:28.269    AVAST engine scan C:\Windows
11:14:32.583    AVAST engine scan C:\Windows\system32
11:19:34.929    AVAST engine scan C:\Windows\system32\drivers
11:19:58.336    AVAST engine scan C:\Users\Sergio
11:26:08.097    AVAST engine scan C:\ProgramData
11:29:12.771    Scan finished successfully
11:31:23.113    Disk 0 MBR has been saved successfully to "C:\Users\Sergio\Desktop\MBR.dat"
11:31:23.116    The log file has been saved successfully to "C:\Users\Sergio\Desktop\aswMBR new.txt"


#10 Surgeo

Surgeo
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:54 AM

Posted 09 February 2013 - 11:43 AM

Here is the last log.    Thank you so much for responding so quickly and helping me with my issue.  It seems that  the TDSSkiller was able to remove the problem.  after i cured W/e it was i did not see the Svchost*32 on task manager.  Again thank you very much, you have helped me a ton.  I can already tell the significant difference in my computers performance. 

C:\Program Files (x86)\MapsGalaxy_39\bar\1.bin\39datact.dll    a variant of Win32/Toolbar.MyWebSearch.A application    cleaned by deleting - quarantined
C:\Program Files (x86)\MapsGalaxy_39\bar\1.bin\39htmlmu.dll    probably a variant of Win32/Toolbar.MyWebSearch.B application    cleaned by deleting - quarantined
C:\Program Files (x86)\MapsGalaxy_39\bar\1.bin\39ieovr.dll    probably a variant of Win32/Toolbar.MyWebSearch.P application    cleaned by deleting - quarantined
C:\Program Files (x86)\MapsGalaxy_39\bar\1.bin\39Plugin.dll    probably a variant of Win32/Toolbar.MyWebSearch application    cleaned by deleting - quarantined
C:\Program Files (x86)\MapsGalaxy_39\bar\1.bin\39skin.dll    a variant of Win32/Toolbar.MyWebSearch.P application    cleaned by deleting - quarantined
C:\Program Files (x86)\MapsGalaxy_39\bar\1.bin\T8HTML.DLL    probably a variant of Win32/Toolbar.MyWebSearch.F application    cleaned by deleting - quarantined
C:\TDSSKiller_Quarantine\09.02.2013_09.42.53\mbr0000\tdlfs0000\tsk0000.dta    Win32/Olmarik.AYI trojan    cleaned by deleting - quarantined
C:\TDSSKiller_Quarantine\09.02.2013_09.42.53\mbr0000\tdlfs0000\tsk0001.dta    Win64/Olmarik.AK trojan    cleaned by deleting - quarantined
C:\TDSSKiller_Quarantine\09.02.2013_09.42.53\mbr0000\tdlfs0000\tsk0002.dta    a variant of Win32/Rootkit.Kryptik.LA trojan    cleaned by deleting - quarantined
C:\TDSSKiller_Quarantine\09.02.2013_09.42.53\mbr0000\tdlfs0000\tsk0003.dta    Win64/Olmarik.AK trojan    cleaned by deleting - quarantined
C:\TDSSKiller_Quarantine\09.02.2013_09.42.53\mbr0000\tdlfs0000\tsk0007.dta    Win32/Olmarik.AFK trojan    cleaned by deleting - quarantined
C:\TDSSKiller_Quarantine\09.02.2013_09.42.53\mbr0000\tdlfs0000\tsk0008.dta    Win64/Olmarik.AK trojan    cleaned by deleting - quarantined
C:\TDSSKiller_Quarantine\09.02.2013_09.42.53\mbr0000\tdlfs0000\tsk0012.dta    Win32/Olmarik.AYI trojan    cleaned by deleting - quarantined
C:\Users\DOROTHY-PC\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DRR14WWU\wbk39C1.tmp    HTML/Phishing.LinkedIn.A trojan    cleaned by deleting - quarantined
C:\Users\DOROTHY-PC\Downloads\pdflite_d793078(1).exe    probably a variant of Win32/InstallIQ application    cleaned by deleting - quarantined
C:\Users\DOROTHY-PC\Downloads\pdflite_d793078.exe    probably a variant of Win32/InstallIQ application    cleaned by deleting - quarantined
C:\Users\DOROTHY-PC\Downloads\pdflite_d793144.exe    probably a variant of Win32/InstallIQ application    cleaned by deleting - quarantined
C:\Users\DOROTHY-PC\Downloads\sunset(1).exe    probably a variant of Win32/InstallIQ application    cleaned by deleting - quarantined
C:\Users\DOROTHY-PC\Downloads\sunset.exe    probably a variant of Win32/InstallIQ application    cleaned by deleting - quarantined
C:\Users\Sergio\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PH71V031\stubinst_pkg_en-us[1].cab    Win32/OpenCandy application    deleted - quarantined
C:\Users\Sergio\AppData\Local\Temp\ICReinstall_windows media player setup.exe    a variant of Win32/InstallCore.AZ application    cleaned by deleting - quarantined
C:\Users\Sergio\AppData\Local\Temp\is754907076\DeltaTB.exe    a variant of Win32/Toolbar.Babylon.A application    cleaned by deleting - quarantined
C:\Users\Sergio\Downloads\Installation\windows media player setup.exe    a variant of Win32/InstallCore.AZ application    cleaned by deleting - quarantined


#11 narenxp

narenxp

  • BC Advisor
  • 16,371 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:India
  • Local time:05:54 AM

Posted 09 February 2013 - 01:24 PM

Malwarebytes

--------------------

Please download Malwarebytes Anti-Malware and save it to your desktop.  If you already have it installed launch the program and update the database.

  • Important!! When you save the mbam-setup file, rename it to something random (such as 123abc.exe) before beginning the download.  You can also right click on the link and select Save Link As

Malwarebytes may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.

  • Make sure you are connected to the Internet and double-click on the renamed file to install the application.
    For instructions with screenshots, please refer to this Guide.
  • When the installation begins, follow the prompts and do not make any changes to default settings except to uncheck any offer for a free Pro trial version
  • Malwarebytes will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • Under the Scanner tab, make sure the "Perform Quick Scan" option is selected.
  • Click on the Scan button.
  • When finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box, then click the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked and then click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows the database version and your operating system.
  • Exit Malwarebytes when done.

Note: If Malwarebytes encounters a file that is difficult to remove, you will be asked to reboot your computer so it can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally will prevent Malwarebytes from removing all the malware.


===================================================


Farbar's MiniToolBox

--------------------

  • Please download MiniToolBox, save it to your desktop
  • Please close any Firefox browsers you may have open
  • Double click the icon to launch the program
  • Make sure the following options are checked:

    • Flush DNS
    • Report IE Proxy Settings
    • Reset IE Proxy Settings
    • Report FF Proxy Settings
    • Reset FF Proxy Settings
    • List content of Hosts
    • List IP configuration
    • List Winsock Entries
    • List last 10 Event Viewer log
    • List Installed Programs
    • List Devices
    • List Users, Partitions and Memory size.
  • Click Go and once the scan is completed a Result.txt Notepad document will open on your desktop
  • Please copy and paste the contents in your reply


===================================================


Farbar's Service Scanner

--------------------

Please download Farbar Service Scanner, save it to your desktop, and run it.

  • Make sure the following options are checked:

    • Internet Services
    • Windows Firewall
    • System Restore
    • Security Center/Action Center
    • Windows Update
    • Windows Defender
    • Other Services
  • Press "Scan".
  • It will create a log (FSS.txt) in the same directory the tool is run.
  • Please copy and paste the log to your reply.


===================================================


AdwCleaner by Xplode - Search for Adware

-------------------

  • Please download AdwCleaner by Xplode onto your desktop.
  • Double click on AdwCleaner.exe, select OK, then Run
  • Click on Search
  • A logfile will automatically open after the scan has finished
  • Copy and paste the contents in your reply
  • You can find the logfile at C:\AdwCleaner[R1].txt as well


===================================================


Junkware Removal Tooll by thisisu

-------------------

  • Please download Junkware Removal Tool and save it to your desktop.
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Right-mouse click JRT.exe and select Run as administrator (Windows XP double click the icon)
  • Please allow the program time to run
  • Once completed a Notepad document will open on your desktop
  • Copy and paste the contents in your reply


===================================================


Rkill

-------------------

Please download Rkill by Grinler from one of the 4 links below (if one of them does not work try another...) and save it to your desktop:


  • In order for Rkill to run properly you must disable your anti-malware software.  Please refer to this page if you are not sure how.
  • Double-click on Rkill. (If you are using Windows Vista, please right-click on it and select Run As Administrator)
    • Note:  You may have to run Rkill a few times before it is successful.  You may also have to download Rkill from a different link which will save it as a different file name.
  • A black screen will appear and then disappear. Please do not worry, that is normal. This means that the tool has been successfully executed.
  • An Rkill.log will appear.  Please copy and paste the contents in your reply (file also located at c:\rkill.log)
  • Do not reboot your computer after running Rkill as the malware programs will start again.  If your computer reboots, run Rkill again before continuing on to the next step.
  • If nothing happens or if the tool does not run, please let me know in your next reply.


===================================================


Autoruns

--------------------

  • Please download AutoRuns and save it to your desktop
  • Double click the AutoRuns.zip folder
  • Double click autoruns.exe (not autorunsc.exe), select Run, then Run again and allow the information to populate
  • Select File, Save, Desktop (in the left hand pane), then Save filename as Autoruns.txt and change Save as type to  Text(*.txt).
  • Double click on the text file,copy and paste the contents in your reply


===================================================


Things I would like to see in your next reply. Please be sure to copy and paste the information rather than send an attachment. :thumbsup2:

  • Malwarebytes log
  • MiniToolBox log
  • Farbar's Service Scanner log
  • AdwCleaner log
  • Junkware Removal Tool log
  • Rkill log
  • Autoruns log

 






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users